Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

security vulnerabilities in the IoT Internet of Things

SQL Slammer 16 years later: Four modern-day scenarios that could be worse

Nothing has ever come close to the speed at which the SQL Slammer worm took down networks. These very possible scenarios might beat it in terms of speed and damage.

spear fishing

How to defend Office 365 from spear-phishing attacks

A recent successful zero-day Flash attack began with a spear-phishing email. These Windows 10 and Office 365 settings could have prevented it.

01 intro prediction

10 cybersecurity trends to watch for 2019

In the early days of 2019, cybersecurity is as challenging as ever. We highlight some of the biggest cybersecurity trends that are set to impact the enterprise, security professionals and companies of all sizes in the year ahead.

robot monitoringa  cog wheel system for maintenance [automation]

Aflac automates threat intelligence to take a proactive security posture

Insurance giant Aflac automated large parts of its cyber threat intelligence operations to create an industry-leading program.

hackathon students code programmer devops certification by rawpixel unsplash

OSCP cheating allegations a reminder to verify hacking skills when hiring

A former student’s claim of widespread cheating on the OSCP exam underscores need to test security job candidates.

3 industrial iot solar power panels energy network internet

Why America is not prepared for a Stuxnet-like cyber attack on the energy grid

The U.S. energy grid continues to be vulnerable to Aurora-like attacks that could cause blackouts lasting a year or more.

blue green abstract finger print identity bio security fingerprint

15 secure coding practices to use in digital identity

Secure coding of any application or service is important, but it is vital in systems that process personal data.

patching against ransomware

The three most important ways to defend against security threats

Patching, security training programs and password management will thwart attacks more effectively than anything else. You're already doing them. Here's how to do them better.

Election 2016 teaser - Electronic voting security for digital election data

Why one of America’s top experts is hopeful for better election security

Voting machines and elections in general are still vulnerable to hacking, says Matt Blaze, but adoption of risk-limiting audits and software independence gives opportunity for improvement.

Microsoft Office logo within an environment of abstract binary code with shield and lock.

Center for Internet Security releases Microsoft 365 benchmarks

Follow the guidance in this CIS document to configure Microsoft 365 security settings to the level that suits your organization.

Slack logo/wordmark [2019]

4 tips to mitigate Slack security risks

A Slack breach would be a nightmare in terms of exposed sensitive data. Here's how to lock down your Slack workspaces.

finger on keyboard with email icons floating out of monitor

Review: GreatHorn offers a better way to secure enterprise email

GreatHorn takes a modern and highly effective approach to protecting enterprise email that goes well beyond the capabilities of legacy mail scanners.

a hand holding a key moves toward an @ symbol with many locks

I can get and crack your password hashes from email

Malicious hackers can use a simple trick to get your Windows computer to authenticate to a remote server that captures your password hash — just by sending you an email. Take these steps to test for the vulnerability.

computer forensics

Building your forensic analysis toolset

Every security team should have these types of digital forensics tools available. Many are free, and there are enough options to find one that suits your skills and approach.

virtual brain / digital mind / artificial intelligence / machine learning / neural network

Why AI-based threat detection hasn’t taken over the market … yet

Vendors, analysts and buyers differ on why threat detection AI isn't more widely adopted, but they agree that it needs to provide better insight to its inner workings.

security audit - risk assessment - network analysis

How to enable audit logs in Microsoft Office 365

Audit logging of Office 365 mail reads makes forensics investigations of attacks much easier. Here's how to make sure it's enabled.

hackathon contest computer competition hacking

How cyber competitions can help fill the cybersecurity talent shortage

The Cyber Security Challenge Masterclass event helps employers find skilled but non-traditional job candidates.

04 encryption

Three encrypted Slack alternatives worth a look

Slack is not end-to-end encrypted, leaving workplaces that use the popular collaboration tool vulnerable to both hackers and nation-state attacks. These encrypted alternatives will keep your team chats private.

ransomware

How to protect backups from ransomware

Ransomware is getting smarter, attacking backups to prevent recovery. Prevent this from happening by taking a few simple steps.

forensics threat hunter cyber security thumbprint

Why you need a digital forensics team (and the skills to look for)

Prevention and detection aren't enough. To better defend against future intrusions, you need a strong digital forensics team that can analyze attacks.

Load More